4.4

CVE-2020-7255

Privilege escalation vulnerability in the administrative user interface in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows local users to gain elevated privileges via ENS not checking user permissions when editing configuration in the ENS client interface. Administrators can lock the ENS client interface through ePO to prevent users being able to edit the configuration.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
McafeeEndpoint Security Version10.5.0 SwPlatformwindows
McafeeEndpoint Security Version10.5.1 SwPlatformwindows
McafeeEndpoint Security Version10.5.2 SwPlatformwindows
McafeeEndpoint Security Version10.5.3 SwPlatformwindows
McafeeEndpoint Security Version10.5.4 SwPlatformwindows
McafeeEndpoint Security Version10.5.5 SwPlatformwindows
McafeeEndpoint Security Version10.6.0 SwPlatformwindows
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.08% 0.249
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.4 1.8 2.5
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
nvd@nist.gov 3.6 3.9 4.9
AV:L/AC:L/Au:N/C:N/I:P/A:P
trellixpsirt@trellix.com 3.9 0.8 2.7
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L
CWE-269 Improper Privilege Management

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.